Report: F-35, V-22, Black Hawk Targeted By Chinese Cyberspies | Aero-News Network
Aero-News Network
RSS icon RSS feed
podcast icon MP3 podcast
Subscribe Aero-News e-mail Newsletter Subscribe

Airborne Unlimited -- Most Recent Daily Episodes

Episode Date

Airborne-Monday

Airborne-Tuesday

Airborne-Wednesday Airborne-Thursday

Airborne-Friday

Airborne On YouTube

Airborne-Unlimited-07.14.25

Airborne-NextGen-07.15.25

AirborneUnlimited-07.16.25

Airborne-FlightTraining-07.17.25

AirborneUnlimited-07.11.25

Thu, May 30, 2013

Report: F-35, V-22, Black Hawk Targeted By Chinese Cyberspies

Among More Than Two Dozen Weapons Systems Compromised By Electronic Intrusion

A confidential Pentagon report shows that Chinese cyberspies have collected data on more than two dozen U.S. weapons systems, including the F-35, the V-22 Osprey, and the Black Hawk helicopter.

The report, which was obtained by the Washington Post, indicates that Chinese cyber-espoinage compromised sensitive information that allowed that country to develop its version of a fifth-generation fighter aircraft much more quickly than it could have on its own. That hack was reportedly accomplished in 2007.

A public version of the report released in January indicated that "(w)hile DoD takes great care to secure the use and operation of the “hardware” of its weapon systems, these security practices have not kept up with the cyber adversary tactics and capabilities. Further, the same level of resource and attention is not spent on the complex network of information technology (IT) systems that are used to support and operate those weapons or critical cyber capabilities embedded within them. This Task Force was asked to review and make recommendations to improve the resilience of DoD systems to cyber attacks and to develop a set of metrics that the Department could use to track progress and shape investment priorities." The list was contained in the confidential version of the report.

The report marks the first time the Pentagon has specifically named the Chinese government and its military as being the source of the cyber espionage. The paper reports that the document does not include specifics of the timing or depth of the security breaches.

FMI: Public Report

Advertisement

More News

ANN's Daily Aero-Term (07.15.25): Charted Visual Flight Procedure Approach

Charted Visual Flight Procedure Approach An approach conducted while operating on an instrument flight rules (IFR) flight plan which authorizes the pilot of an aircraft to proceed >[...]

Aero-News: Quote of the Day (07.15.25)

“When l became the Secretary of Defense, I committed to rebuild our military to match threats to capabilities. Drones are the biggest battlefield innovation in a generation, >[...]

ANN's Daily Aero-Linx (07.15.25)

Aero Linx: Stearman Restorers Association Welcome to the Stearman Restorers Association. The Stearman Restorers Association is an independent “Not for Profit” 501C-3 Co>[...]

NTSB Final Report: Kjelsrud Gary Kitfox

Airplane Exhibited A Partial Loss Of Engine Power When It Was About Halfway Down The Runway Analysis: The pilot of the experimental amateur-built airplane was departing from his pr>[...]

NTSB Prelim: Cessna A150L

The Flight Path Was Consistent With Low-Altitude Maneuvering On June 18, 2025, about 0922 mountain standard time, a Cessna A150L airplane, N6436F, was substantially damaged when it>[...]

blog comments powered by Disqus



Advertisement

Advertisement

Podcasts

Advertisement

© 2007 - 2025 Web Development & Design by Pauli Systems, LC